
SOC Analyst L2
17 hours ago
What were looking for
- To support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst(L2) to support Rackspaces strategic customers.
- This role is particularly well-suited to a self-starting, experienced and motivated Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain.
- As a Security Operations Analyst(L2), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments.
- The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customers key stakeholders, which may include incident response and disaster recovery teams as well as information security.
Key Accountabilities
- Should have experience of 4-7years in SOC.
- Ensure the Customers operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner.
- Critical incident analysis & validation
- Platform management tasks like checking the health status and basic troubleshooting.
- Create new runbooks, playbooks and knowledgebase documents.
- Trend monitoring & analysis
- Threat and vulnerability impact analysis
- Reactive discovery of adversaries based on threat advisory or intelligence reports.
- Compliance reporting
- Onboarding of log sources
- Rule and dashboard enhancements
- Basic threat hunting
- Created and manage the watchlists.
- Handling escalations from L1 Analysts
- Review the L1 handled Incident and prepare individual scorecards.
- Prepare and review the weekly and monthly reports.
- Co-ordinate with vendor for issue resolution
- Use of threat intelligence platforms such as OSINT, to understand latest threats. Researching and analysing the latest threats to better understand an adversarys tactics, techniques, and procedures (TTPs).
- Automation of security processes and procedures to enhance and streamline monitoring capabilities.
- Ensure all Zero Day vulnerabilities are resolved within agreed SLA (Service Level Agreement) periods by respective teams which was reported by L2 Analyst team.
- Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc.
- Required to work in 24/7 Rotational shift.
Skills & Experience
- Existing experience as a Security Operations Analyst, or equivalent.
- Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: -
- Microsoft Sentinel
- Microsoft 365 Defender
- Microsoft Defender for Cloud
- Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint.
- Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco.
- Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF.
- Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office
- Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec
- Nice to have skills/experience includes:
- Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre
- Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail
- Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis.
- Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls.
- Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc.
- Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell.
- Knowledge of DevOps practices such as CI/CD, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins.
- Computer science, engineering, or information technology related degree (although not a strict requirement)
- Holds one, or more, of the following certificates (or equivalent): -
- Certified Information Security Systems Professional (CISSP)
- Microsoft Certified: Azure Security Engineer Associate (AZ500)
- Microsoft Certified: Security Operations Analyst Associate (SC-200)
- CREST Practitioner Intrusion Analyst (CPIA)
- CREST Registered Intrusion Analyst (CRIA)
- CREST Certified Network Intrusion Analyst (CCNIA)
- Systems Security Certified Practitioner (SSCP)
- Certified Cloud Security Professional (CCSP)
- GIAC Certified Incident Handler (GCIH)GIAC
- Security Operations Certified (GSOC)
- A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail.
- A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture.
- Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure.
- An individual who shows a willingness to go beyond in delighting the customer.
- A good communicator who can explain security concepts to both technical and non-technical audiences.
-
Soc Analyst 2
16 hours ago
Gurugram, India Purplesynapz Labs Full timeWe are seeking a skilled Qradar SOC Analyst / Consultant - L2 with 3-6 years of experience to join our dynamic Security Operations Center in Gurgaon/Gurugram. The ideal candidate will have hands-on experience with IBM QRadar SIEM
-
soc analyst
3 days ago
gurugram, India Randstad Full timeSOC Analyst Intune, Infraexperience8
-
soc
2 weeks ago
Gurugram, New Delhi, Noida, India ERM Placement Services Full time US$ 90,000 - US$ 1,20,000 per yearResponsibilities -L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting.L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat...
-
Soc Analyst
6 days ago
Delhi, Gurugram, NCR, Noida, India KPMG Assurance and Consulting Services LLP Full time ₹ 1,04,000 - ₹ 13,08,780 per yearJob Discribtion:Global Security Operation Center (GSOC)KPMGs Global Security Operations Centre (GSOC) is internal SOC team supporting KPMG member firms to detect and respond to cyber-attacks to KPMG across locations.GSOC Operation – Monitoring & Alerting (M&A)GSOC – Engineering Services (ES) – SIEM technology management including onboarding...
-
SOC L1 Analyst
17 hours ago
Gurugram, India Assystem Full timeAssystem Stup is a full-service project delivery consultancy company offering master planning, comprehensive building design, engineering and project management services. We serve many clients in decarbonised energy, transportation, cities & territories, buildings and commercial, institutional, recreational and manufacturing facility infrastructures. As part...
-
Sr. Soc Analyst
2 weeks ago
Bengaluru, Gurugram, Mumbai, India Capgemini Full time ₹ 1,04,000 - ₹ 1,30,878 per yearRole & responsibilitiesJD:This position is for a core team member at best a Technical Lead" NOT "Soc Manager" to supplement the firm's growing cyber security monitoring function, starting from 5 to max 10yrs of experience having hands on L3/Engineering level work in most recent projects.The candidate will join a team currently responsible for:Providing first...
-
Soc Analyst
18 hours ago
Gurugram, India Path Mentors Staffing Solution Full time3+ years of experience with one or more of the following technologies from an operator or administrator perspective: Microsoft servers, Linux servers, networking devices, security applications.Experience working in a customer support environment Required Candidate profile The Analyst responds within established service levels to incidents and requests in...
-
Incident Response Analyst
2 weeks ago
Gurugram, Noida, India Oculus IT Full time ₹ 9,00,000 - ₹ 12,00,000 per yearWe are looking for a dynamic and detail-oriented Command Center Incident Response Engineer to join our 24x7 Security Operations team. The ideal candidate will have hands-on experience in incident response, network security administration, and Wintel (Windows + Intel) security operations at an L2 level. This role is critical in ensuring real-time monitoring,...
-
Senior Security Analyst
18 hours ago
Gurugram, India Ahead Full timeSOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess...
-
Security Analyst
16 hours ago
Gurugram, India ADVATIX - Advanced Supply Chain and Logistics Full timeWe are seeking a highly experienced SOC L3 Analyst to strengthen our Security Operations Center. The ideal candidate will have advanced expertise in monitoring, analyzing, and mitigating cybersecurity threats, as well as managing security tools and mentoring junior analysts. This role involves proactive threat hunting, incident response, and collaboration...